0% found this document useful (0 votes)
513 views72 pages

M04 - Providing Network Systems Administration

Uploaded by

eliasbest47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
513 views72 pages

M04 - Providing Network Systems Administration

Uploaded by

eliasbest47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

HARDWARE AND NETWORKING

SERVICE LEVEL- IV
Based on November, 2023Version-II

MODULE TITLE: - Provide Network System


Administration
MODULE CODE: EIS HNS4 M04 1123
NOMINAL DURATION: 45 Hours

Prepared by: - Ministry of Labor and Skill

November 2023
Addis Ababa, Ethiopia
Table of Contents
Acknowledgment ........................................................................................................................... iii
Acronym ........................................................................................................................................ iv
Introduction to module .................................................................................................................... v
Module Instruction ......................................................................................................................... vi
Unit One: Client access and security ........................................................................................... 7
1.1. Basic concept of network system administration ............................................................. 8
1.2. Accounts and files privilege ........................................................................................... 12
1.3. Determine access privileges ........................................................................................... 12
1.4. Maintain System integrity and security.......................................................................... 15
Self-check - 1 ................................................................................................................................ 18
Operation sheet 1.1 ....................................................................................................................... 20
LAP Test ....................................................................................................................................... 24
Unit Two: Disseminate disaster recovery plan ......................................................................... 25
2.1. Basic concepts of disaster recovery plan ........................................................................... 26
2.2. Backup and restore ............................................................................................................. 27
Self-check - 2 ................................................................................................................................ 31
Operation sheet 2.1 ....................................................................................................................... 33
Operation sheet 2.2 ....................................................................................................................... 36
LAP Test ...................................................................................................................................... 40
Unit Three : Monitor network performance ........................................................................... 41
3.1. Basic concept of monitor network performance ............................................................ 42
3.2. Performing diagnostic test .............................................................................................. 42
3.3. Analyze and respond information .................................................................................. 44
3.4. Monitor software and files ............................................................................................. 45
3.5. Monitor performance indicators ..................................................................................... 46
3.6. Improve network and systems ........................................................................................ 47
Self-check - 3 ............................................................................................................................... 50
Operation sheet 3.1. ...................................................................................................................... 51
Operation sheet 3.2. ...................................................................................................................... 53
LAP Test ....................................................................................................................................... 60
Unit Four : Migrate to New Technology .................................................................................. 61

Page i of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
4.1. Basic concept of Migrating to new technology .............................................................. 62
4.2. Develop new skills. ........................................................................................................ 62
4.3. Upgraded technology skills ............................................................................................ 63
4.4. Identify upgraded equipment. ........................................................................................ 63
4.5. Understand Sources of information for new or upgraded equipment ............................ 66
4.6. Use new or upgraded equipment .................................................................................... 66
Self-check - 4 ............................................................................................................................... 69
Reference ...................................................................................................................................... 70
Developer profile .......................................................................................................................... 71

Page ii of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Acknowledgment
Ministry of Labor and Skills wish to extend thanks and appreciation to the many
representatives of TVET instructors and respective industry experts who donated
their time and expertise to the development of this Teaching, Training and Learning
Materials (TTLM).

Page iii of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Acronym
5G:- Fifth-Generation
ACLs:- Access Control Lists
ATP:- Advanced Threat Protection
DPI:- Deep Packet Inspection
DRP:- Disaster Recovery Plan
IEEE:- Institute Of Electrical And Electronics Engineers
PoE :- Power Over Ethernet
QoS:- Quality Of Service
SLA:- Service Level Agreement
SNMP:- Simple Network Management Protocol
SQL:- Standard Query Language
SSDs:- Solid-State Drives
VLANs:- Virtual Local Area Networks
Wi-Fi:- Wireless Fidelity
WSUS:- Windows Server Update Services

Page iv of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Introduction to module
This module defines the competence required to design and implement an infrastructure for
internet services. Network systems administration refers to the management and maintenance of
computer networks within an organization. It involves the configuration, monitoring, and
troubleshooting of network infrastructure to ensure its optimal performance, security, and
availability.
Disaster recovery for a network involves implementing strategies and procedures to restore
network functionality and data in the event of a major disruption or catastrophic event.
This module is designed to meet the industry requirement under the Hardware and Networking
Service occupational standard, particularly for the unit of competency: Providing Network
System Administration This module covers the units:
 Client access and security
 Disseminate disaster recovery plan
 Monitor network performance
 Migrate to New Technology
This guide will also assist you to attain the learning outcome stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
 Understand network system administration
 Explain accounts and files privilege
 Determine access privileges
 Maintain System integrity and security
 Understand concepts of disaster recovery plan
 Understand Backup and restore
 Analyze and respond information
 Monitor software and files
 Monitoring performance indicators
 Upgrade technology skills
 Identify upgraded equipment.
 Use new or upgrade equipment

Page v of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Module Instruction
For effective use this modules trainees are expected to follow the following module instruction:

1. Read the specific objectives of this Learning Guide.

2. Read the information that this module contain.

3. Complete the Self-check.

4. Submit your accomplished Self-check.

5. Do the Operations which in the module.

6. Do the LAP test

Page vi of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Unit One: Client access and security

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
 Overview of Network System Administration
 Accounts and files privilege
 Determining access privileges
 Maintaining System integrity and security
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
 Understand Network System Administration
 Explain Accounts and files privilege
 Determine access privileges
 Maintain System integrity and security

Page 7 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
1.1. Basic concept of network system administration

Network system administration involves managing and maintaining the operation, security, and
performance of a network infrastructure. It encompasses various tasks and responsibilities to
ensure the network functions reliably and efficiently. Network administration aims to manage,
monitor, maintain, secure, and service an organization’s network. However, the specific tasks and
procedures may vary depending on the size and type of an organization.
Network administration primarily consists of, but is not limited to, network monitoring, network
management, and maintaining network quality and security.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network. It helps detect abnormal activity, network
issues, or excessive bandwidth consumption early on and take preventative and remedial actions
to uphold the network quality and security. Network management encompasses multiple
administrative functions, including network planning, implementation, and configuration. It
involves:
 Re-planning the network based on changing organizational requirements
 Implementing the network for maximum efficiency
 Configuring various networking and security protocols
 Applying security patches and updating the firmware of the networking infrastructure, such
as routers, hubs, switches, and firewalls
 Assessing the network for weaknesses
 Evaluating quality and capacity to increase or decrease network capacity and manage
resource wastage
Network security employs various techniques to ensure a network is secure. For example, it uses
multiple tools such as firewalls, intrusion detection or prevention systems, and anti-malware
software to prevent or detect malicious activity in the network.
 Network administration goals
Network administration aims to ensure a reliable, secure network conducive to business
operations. Generally, network administration goals include:
 Maintain a resilient, high-quality network
 Plan and improve network capacity to enable seamless network access and operations

Page 8 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
 Leverage networking tools for network systems administration and better network
administration control
 Track and document relevant changes
 Evaluate possible risks and orchestrate effective mitigations
 Prevent activities compromising or using the network as an attack vector
 Identify and mitigate intrusions to avoid security breaches
1.1.1 Network administration key areas
Networks administration consists of five key areas:
1. Fault management: - Monitors the network infrastructure to identify and address issues
potentially affecting the network. It uses standard protocols such as Simple Network Management
Protocol (SNMP) to monitor network infrastructure.
2. Configuration management: - Tracks configuration and related changes of network
components, including switches, firewalls, hubs, and routers. As unplanned changes can affect the
network drastically and potentially cause downtime, it is essential to streamline, track, and manage
configuration changes.

Figure 1. 1 Configuration management steps

3. Account management: - Tracks network utilization to bill and estimate the usage of various
departments of an organization. In smaller organizations, billing may be irrelevant. However,
monitoring utilization helps spot specific trends and inefficiencies.
4. Performance management: - Focuses on maintaining service levels needed for efficient
operations. It collects various metrics and analytical data to continually assess network
performance, including response times, packet loss, and link utilization.
5. Security management:- Aims to ensure only authorized activity and authenticated devices and
users can access the network. It employs several disciplines such as threat management, intrusion

Page 9 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
detection, and firewall management. It also collects and analyzes relevant network information to
detect and block malicious or suspicious activity.

Figure 1. 2 Network security management

1.1.2. Network administrator tools and software


Network administrators use various networking software and tools to optimally perform network
operations, including compliance, automation, configuration, real-time monitoring and alerting,
network inventory management, performance management, and vulnerability assessment.
Due to the increasing number of networking components in an organization’s network, it becomes
difficult to manage the network manually, which is also error-prone. By implementing basic and
advanced tools, network administrators can automate several tasks and focus on more value-adding
tasks needing their attention.

Page 10 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Figure 1. 3 Network administrator tools

1.1.3. Responsibilities of network administrator


A network administrator focuses on the day-to-day aspects of managing and maintaining a
network. The roles and responsibilities of network administrators are outlined below.
 Is responsible for managing and maintaining the network in real time
 Ensures the network is secure by blocking suspicious activity and mitigating the risk of
security breaches
 Implements security programs based on
hardware and software
 Manages on-site networking servers
responsible for business operations
 Ensures network integrity and resilience to
maintain service levels
 Tests the network to uncover weaknesses and
mitigate them
 Monitors and tracks utilization
 Applies utilization, authentication, and
authorization policies to maintain the quality and
security of the network

Figure 1. 4 Responsibilities of network administrator

Page 11 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
1.2. Accounts and files privilege

Applying account and file privileges involves configuring access controls to ensure that only
authorized users can access specific accounts and files. Here are some steps to apply account and
file privileges effectively:
1. User Account Creation: Create user accounts for individuals who require access to the system
or files. Each user should have a unique username and password combination.
2. User Groups: Group users based on their roles and responsibilities. This simplifies privilege
management by assigning privileges to groups rather than individual users.
3. Principle of Least Privilege: Follow the principle of least privilege, which means granting
users the minimum level of privileges required to perform their job functions. Avoid giving
excessive permissions that could potentially lead to security vulnerabilities.
4. Access Control Lists (ACLs): Utilize access control lists to define access permissions for files
and directories.
5. File Ownership: Assign appropriate file ownership to ensure accountability and control. Only
authorized users or groups should own sensitive files or directories.
6. Regular Access Reviews: Perform regular access reviews to identify and remove unnecessary
or outdated privileges. This helps maintain a clean and secure access control environment.
7. Password Policies: Enforce strong password policies to protect user accounts. Require users
to create passwords that meet complexity requirements (e.g., minimum length, a combination
of letters, numbers, and special characters) and encourage regular password updates.
8. Regular Auditing and Monitoring: Implement logging and monitoring mechanisms to track
user activities, access attempts, and changes to account and file privileges. Regularly review
logs and audit trails to identify suspicious behavior and potential security breaches.
9. Training and Awareness: Provide training and awareness programs to educate users about
the importance of account and file privilege management. Users should understand their
responsibilities in safeguarding sensitive data and be aware of best practices for access control.
1.3. Determine access privileges
When a user tries to perform a privileged operation, the system checks the user's access token to
determine whether the user holds the necessary privileges1. If the user holds the necessary
privileges, the system checks whether the privileges are enabled.

Page 12 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Access privileges can be viewed and modified in the Operations Server console. The following
primary roles can be subdivided into additional categories if necessary to match your organization:
 System Administrator: Responsible for configuring and maintaining the Operations Center
environment, including:
 Defining adapter connections to key components such as databases and remote
management systems
 Defining service model hierarchies, automations, and operations,
 Defining custom classes, behavior models, and property pages
 Defining calendars, schedules, and jobs
 Creating custom SQL Views
 Creating Layout views
 Determining which users should have access to specific element hierarchies
 Security Manager: Responsible for enforcing company security policies regarding user
access to the system, user identification and authorization, password rules, access privileges,
and so on. Also responsible for managing users and groups and enforcing password policies
and rules.
 End Users: Responsible for analyzing and reporting information collected in Operations
Center from various sources. You should organize users who have similar authorization to
access data into groups, such as by job function or security clearance level.
Table 1. 1 Access Control Privileges

Access Description
Privilege
View The user can view elements, as well as their alarms and properties, and relationships
to other elements that the user can view.
Note for T/EC adapters: Any user with the View permission can suppress a T/EC
alarm; however, this user cannot acknowledge or close the alarm.
Manage The user can perform nonintrusive actions (such as Ping or TraceRoute) as well as
update element information (such as custom properties).
Note for T/EC adapters: Any user with the Manage permission can acknowledge or
close a T/EC alarm.

Page 13 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Access The user can access remote managed elements by using “connect to” operations with
adapters that support cut-through telnet such as the Event Manager, OpenView, and
Netcool*. An example operation is using the Console capability in
the Elements hierarchy.
Define The user can perform administrative tasks such as adding scripts, sites, and service
model elements, as well as creating, deleting, and changing the definition of adapters,
service models and SLAs in Operations Center.
Undefined Not defining access privileges avoids conflicts. For example, the two groups in the
following figure have the following permissions at the top (root) Access Control level:

The admins group has Define privileges explicitly defined. The users group has
undefined Define privileges. Therefore, a member of both groups has Define
privileges.

Page 14 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Figure 1. 5 Determining access privileges

1.4. Maintain System integrity and security

1.4.1. System integrity


System integrity refers to the state of a computer system or network being complete, accurate, and
secure. It involves ensuring that the system operates as intended, without unauthorized
modifications, corruption, or compromise. System integrity encompasses various aspects,
including data integrity, configuration integrity, and overall security.
Data Integrity: Data integrity refers to the accuracy, consistency, and reliability of data stored
within a system. It ensures that data remains unchanged and uncorrupted throughout its lifecycle.
Measures such as data validation, checksums, and error detection techniques are used to maintain
data integrity.
Configuration Integrity: Configuration integrity involves verifying and maintaining the integrity
of system configurations, settings, and parameters.

Page 15 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
It ensures that the system is properly configured according to established standards and best
practices. Unauthorized changes to system configurations can introduce vulnerabilities or disrupt
system functionality.
Software Integrity: Software integrity focuses on ensuring that software applications and
programs are free from defects, vulnerabilities, or unauthorized modifications. It involves
implementing secure coding practices, performing regular software updates and patching, and
conducting code reviews and software testing to identify and fix vulnerabilities.
Hardware Integrity: Hardware integrity refers to the assurance that computer hardware
components are functioning correctly and have not been tampered with or compromised. It
involves validating the authenticity and integrity of hardware components, monitoring for
hardware failures, and protecting against unauthorized modifications or hardware-based attacks.
System Security: System security is a critical aspect of system integrity. It involves protecting the
system against unauthorized access, data breaches, malware, and other security threats. This
includes implementing access controls, strong authentication mechanisms, encryption, intrusion
detection and prevention systems, and ongoing monitoring
and auditing of system activities.
Maintaining system integrity is essential to ensure the
reliability, availability, and confidentiality of information,
as well as the proper functioning of computer systems and
networks. It requires a combination of technical controls,
security measures, and proactive monitoring to prevent
unauthorized changes, detect potential vulnerabilities, and
respond promptly to security incidents.

Figure 1. 6 System integrity management

1.4.2. System security


The security of a computer system is a crucial task. It is a process of ensuring the confidentiality
and integrity of the OS. Security is one of most important as well as the major task in order to keep
all the threats or other malicious tasks or attacks or program away from the computer’s software
system.

Page 16 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances, but no system can guarantee absolute security from several of various malicious
threats and unauthorized access.
The security of a system can be threatened via two violations:
Threat: A program that has the potential to cause serious damage to the system.
Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental threats.
Malicious threats, as the name suggests are a kind of harmful computer code or web script
designed to create system vulnerabilities leading to back doors and security breaches. Accidental
Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service DDoS attack.

Figure 1. 7 Network security

Page 17 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Self-check - 1

Part I:- Say True if the given statement is correct else say False
_______1. When determining access privileges in a network system, factors such as user's physical
location and job title should be considered.
_______2. Granting all users the highest level of access possible is a recommended approach for
determining access privileges.
_______3. Storing sensitive data in plain text files is a secure practice for maintaining system
integrity and security.
Part II: - Select the appropriate answer from the given alternative
_______1. When referring to accounts and files privilege in network system administration, what
does the term "privilege escalation" mean?
A. Granting additional permissions to a user
B. Revoking all access privileges from a user
C. Assigning a new username to a user
D. Changing the file ownership to a different user
_______2. In the context of determining access privileges, what is the principle of "least privilege"?
A. Granting users the highest level of access possible
B. Assigning access privileges based on job titles
C. Limiting user access to only the resources necessary for their tasks
D. Providing all users with equal access privileges
_______3. Which of the following is an example of a multifactor authentication method for
determining access privileges?
A. Using a username and password combination
B. Requiring a fingerprint scan and a password
C. Granting access based solely on IP address
D. Sharing a single password among multiple users
_______4. What is the purpose of implementing intrusion detection systems (IDS) in network
system administration?
A. To prevent unauthorized access to the system
B. To monitor network traffic and detect potential security breaches

Page 18 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
C. To encrypt sensitive data during transmission
D. To manage user accounts and access privileges
_______5. Which of the following is an example of a security measure for maintaining system
integrity and security?
A. Regularly updating antivirus software
B. Sharing passwords with coworkers for convenience
C. Allowing unrestricted remote access to the system
D. Storing sensitive data in plain text files
Part II: - Give short answer
1. What are the responsibilities of system administrator?
2. Demonstrate the difference between system security and system integrity with example?
3. List and explain Network administration key areas?

Page 19 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Operation sheet 1.1
Operation title: - Accounts and files privilege
Purpose:- Protect and give privilege for user account and computer files
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
 Tools and requirement:,- Computes
Task 1:- Give full access privilege for user
Step 1:- Open File Explorer.
Step 2:- Browse and find the file or folder you
want to have full access.
Step3:- Right-click it, and select Properties.
Step 4:- Click the Security tab to access the
NTFS permissions.
Step 5:- Click the Advanced button.

Step 6:- On the "Advanced Security Settings" page, you need to click the Change link, in the
Owner's field.

Page 20 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 7:- Click the Advanced button.
Step 8:- On the "Select User or Group" page,
click the Find Now button.
Step 9:- From the search result, select your user
account, and click OK.

Step 10:- On the "Select User or Group" page, click OK.


Step 11:-Click Apply.
Step 12:- Click OK.

Step 13:- Click OK again.


Step 14:- Click OK one more time to complete this task.

Page 21 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Task 2:- Replace ownership on sub containers and object
Step 1:- Right-click the file or folder and select Properties.
Step 2:- Click the Security tab to access the NTFS permissions.
Step 3:- Click the Advanced button.
Step 4:- Under the Permissions tab, click Add.

Step 5:- Click Select a principal to add your user account.


Step 6:- On the "Select User or Group" page, click the Find
Now button.
Step 7:- From the search result, select your user account, and
click OK.
Step 8:- On the "Select User or Group" page, click OK.

Step 10:-On "Permission Entry", check the Full control option.

Page 22 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 11:-Click OK

Step 12:- Click OK.


Step 13:- Click Apply.
Step 14:- Click OK.
Step 15:- Click OK to close the file or folder properties to complete the task.

Page 23 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
LAP Test
Task 1. Create one administrator account and standard account in one computer
Task 2. On the above administrator account on local desk C:/ create one folder called user
privilege
Task 3. Give full access privilege for the above created standard account

Page 24 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Unit Two: Disseminate disaster recovery plan

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Basic concepts of disaster recovery plan


 Backup and restore
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:

 Basic concepts of disaster recovery plan


 Backup and restore

Page 25 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
2.1. Basic concepts of disaster recovery plan

A Disaster Recovery Plan (DRP) is a structured approach to responding to and recovering from
events that can cause data loss, system downtime, and other disruptions to normal business
operations. Modern organizations have to operate on a 24/7 basis in order to stay competitive in
the market. It is important to create a disaster recovery (DR) plan so as to ensure that your business
can continue to operate even during a DR event. However, when designing a DR plan, many
businesses overlook the importance of network disaster recovery. In this blog post, we will discuss
what network disaster recovery planning entails and how to securely protect your organization
against network failures.
A network disaster recovery plan includes a set of procedures required to effectively respond to a
disaster that affects a network and causes its disruption. Network disaster recovery planning
generally entails:
 Listing the steps which should be undertaken in order to restore network connectivity
 Identifying people responsible for conducting network disaster recovery
 Assessing possible consequences of a network failure
 Determining the best strategies to mitigate them
The main purpose of network disaster recovery is to ensure that business services can be
delivered to customers despite a disruption in network connectivity. However, disasters come in
different forms and sizes, which makes it hard to predict what their impact would be, which
network components would be affected, and how many resources would be required to restore
network connectivity.

Possible Causes of Network Failures


Network services are required for ensuring an uninterrupted flow of communications and data
transfer within your IT infrastructure. Various factors can lead to network failure. These include:
 Hardware failure. Network equipment such as routers, switches, modems, gateways, or
any other device can fail and, as a result, affect the performance of all other devices
connected to them.
 Cascading failure. A single network consists of multiple routers, nodes, or switches. One
of those network components might become overloaded and stop working, which can
trigger a cascade of failures within a single network.

Page 26 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
 Issues with the internet connection. Failure to set up an internet connection can cause
problems with network connectivity and interrupt data transfer.
 Human errors. Sometimes, network connectivity problems might be the result of mistakes
made by employees when working with network equipment or manually configuring
network components.
 Network attacks. Network services can get disrupted after a cyber-attack, whose aim is to
prevent the organization from delivering its services, forcing it to shut down.
 Natural or man-made disaster. Disasters of any type can significantly damage or even
destroy your production center and virtual infrastructure, thus causing significant business
losses.

Figure 2. 1 Tips for Disaster Recovery Planning

2.2. Backup and restore

2.2.1. Backup for disaster recovery


Backup is a crucial element of disaster recovery, providing a means to safeguard critical data,
applications, and systems in case of unforeseen events. It involves creating duplicate copies of
essential information and storing them on separate devices or off-site locations. These backups are
performed regularly to capture the most up-to-date data and ensure its availability for recovery
purposes.
In the event of a disaster or data loss, such as hardware failures, natural disasters, cyberattacks, or
accidental deletions, the backups serve as a reliable source for restoring the affected systems. By
having comprehensive backups, organizations can minimize downtime and mitigate the potential

Page 27 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
loss of data, enabling them to recover quickly and resume normal operations. Backup strategies
often include different levels of redundancy, encryption, and verification processes to ensure the
integrity and security of the stored information.
There are several types of backups that can be employed, each offering different levels of data
protection and recovery options. Some common types of backups include:
1. Full Backup: A full backup involves creating a complete copy of all data and files in a
system or storage device. It captures all data, regardless of whether it has changed since
the last backup. Full backups are comprehensive but can be time-consuming and require
significant storage space.

Figure 2. 2 Full Backup

2. Incremental Backup: Incremental backups only capture and store changes made since the
last backup, whether it was a full or incremental backup. This approach is more efficient
in terms of time and storage space, as it only backs up the modified or new data. However,
recovery from incremental backups may require multiple backup sets to be restored.

Figure 2. 3 Incremental Backup

Page 28 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
3. Differential Backup: Differential backups capture all changes made since the last full
backup. Unlike incremental backups, which only include changes since the last backup
(whether full or incremental), differential backups include changes since the last full
backup. This results in faster recovery compared to incremental backups, as only the last
full backup and the differential backup need to be restored.

Figure 2. 4 Differential Backup

4. Mirror Backup: A mirror backup creates an exact replica of the source data or system. It
involves copying all files and directories to a separate storage device or
location. Mirror backups provide a straightforward recovery process, as
the backup is a direct copy of the original data. However, they can
consume significant storage space and may not offer versioning or point-
in-time recovery capabilities.
5. Snapshot Backup: Snapshot backups capture the state of a system or data at a specific
point in time. Instead of copying all data, snapshot backups store the
differences or changes made since the previous snapshot. This allows
for fast and efficient backups and provides the ability to restore data to
specific points in time.
6. Cloud Backup: Cloud backup involves storing data backups in off-site cloud storage. It
offers the advantage of scalability, accessibility from anywhere
with an internet connection, and built-in redundancy provided by
the cloud service provider. Cloud backups can be performed
using various backup methods, such as full, incremental, or
snapshot backups.
The choice of backup type depends on factors such as the data volume, frequency of changes,
recovery requirements, available storage resources, and budgetary considerations. A combination
of backup types can be employed to create a comprehensive backup strategy that meets specific
needs for data protection and recovery.

Page 29 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
2.2.2. Restore for disaster recovery
In the context of disaster recovery, the term "restore" refers to the process of recovering and
returning critical data, applications, and systems to their operational state following a disruptive
event or data loss. The restore phase is a key component of the overall disaster recovery plan and
involves the following:
1. Assess the situation: Before initiating the restore process, assess the extent of the damage
caused by the disaster and determine the scope of the restoration effort. Identify the affected
systems, applications, and data that need to be restored.
2. Activate the disaster recovery plan: Refer to the documented disaster recovery plan, which
should outline the procedures and guidelines for restoring various components of the IT
infrastructure. Follow the plan's instructions to ensure a structured and organized approach to
the restore process.
3. Retrieve backups: Retrieve the backup copies of the affected data, applications, or systems
from the designated backup storage location. This may involve accessing backup tapes, disk-
based backups, or cloud-based backups depending on the backup strategy and technology in
place.
4. Validate backup integrity: Verify the integrity and consistency of the backup data before
proceeding with the restore process. This step ensures that the backups are viable and can be
relied upon for successful recovery.
5. Restore data and applications: Start the restoration of data and applications based on the
recovery priorities defined in the disaster recovery plan. Begin with the most critical systems
and work your way down to less critical ones. Follow the appropriate procedures for each
type of backup (e.g., full backups, incremental backups) to restore the data and applications
to their original or alternative locations.
6. Test and verify: After the restore process, conduct thorough testing to validate the restored
data, applications, and systems. Perform functional tests, check for data integrity, and ensure
that the restored components are working correctly.
7. Update configurations and connections: Adjust configurations and re-establish connections
as necessary to integrate the restored systems back into the production environment.
8. Document the restore process: Maintain detailed documentation of the restore process,
including the steps performed, any issues encountered, and the actions taken to resolve them.

Page 30 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Self-check - 2
Part I:- Say True if the given statement is correct else say False
_______1. A disaster recovery plan (DRP) only focuses on recovering data and does not address other
aspects of business operations.
_______2. Backup and restore processes are only necessary for natural disasters and do not apply to
other types of disruptions.
_______3. Having a backup solution in place guarantees instant recovery of data and systems in the
event of a disaster.
_______4. Data backup and replication are interchangeable terms, representing the same process.
Part II: - Select the appropriate answer from the given alternative

_______1. What is the primary goal of a disaster recovery plan (DRP)?


A. Preventing disasters from occurring
B. Minimizing the impact of disasters on business operations

C. Recovering data and systems instantly after a disaster


D. Eliminating the need for regular backups
_______2. What is the purpose of conducting a business impact analysis (BIA) in the context of a
disaster recovery plan?
A. Identifying critical business functions and their dependencies
B. Assessing the likelihood of specific disaster events occurring
C. Implementing cybersecurity measures to prevent data breaches
D. Evaluating the effectiveness of backup and restore processes
_______3. Which of the following is an example of an off-site backup location?
A. An external hard drive connected to the same server
B. A cloud storage service hosted by a third-party provider
C. shared network folder on the same local network
D. An additional internal hard drive within the same computer
_______4. What does the term "recovery point objective" (RPO) refer to in backup and restore?
A. The maximum tolerable downtime after a disaster
B. The amount of data that can be recovered within a specific timeframe

Page 31 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
C. The point in time to which data can be restored after a disaster
D. The frequency at which backups are performed
_______5. Which of the following is a common backup strategy for ensuring redundancy and data
availability?
A. Full backup performed daily
B. Incremental backup performed weekly
C. Differential backup performed monthly
D. Snapshot backup performed hourly
Part II: - Give short answer
1. List and explain types of backups?
2. Demonstrate the main purpose of network disaster recovery in large and small
organization?
3. Demonstrate disaster restore phase?

Page 32 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Operation sheet 2.1
Operation title: - Create a full backup of Windows 10 with the system image tool
Purpose: - Protect and save personal information from disaster.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
 Tools and requirement:-Compute
Procedures:-
Step 1:- Open Settings.
Step 2:- Click on Update & Security.
Step 3:- Click on Backup.
Step 4:- Under the "Looking for an older backup?"

Step 5:- Click the "Create a system image" option from the left pane.

Page 33 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 6:- Select the "On a hard disk" option.

Step 7: -Use the "On a hard disk" drop-down menu and select the location to export the
Windows 10 full backup.

Step 8: -Click the Next button.


Step 9:- (Optional) Select any additional hard drives to include them in the backup.
Step 10:- Click the Next button.
Step 11:- Click the Start backup button.

Page 34 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 12:- Click the No button.
Step 13:- Click the Close button.

Page 35 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Operation sheet 2.2
Operation title: - Restore a backup with system image tool on Windows 10
Purpose: - To recover distorted or damage information.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute, Windows 10 USB bootable drive
Procedures:-
Step 1:- Connect the drive with the full back up to the device.
Step 2:- Connect the Windows 10 USB bootable drive to the computer.
Step 3:- Start the computer.
Step 4:- On the USB bootable drive startup prompt, press any key to continue.

Quick tip: If the device does not start in the Windows Setup wizard, you will need to access the
Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) to change
the boot order settings. You can use this guide to access the BIOS/UEFI, but the steps are usually
different per manufacturer and device model. It is recommended to check your manufacturer
support website for more specific details.

Step 5:- On the "Windows Setup" page, click the Next button.

Page 36 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 6:- Click the "Repair your computer" option from the bottom-left corner of the screen.

Step 7:- Click the Troubleshoot option.

Step 8:- Click the "System Image Recovery" option

Step 9:- Select the Windows 10 option as the target operating system.

Page 37 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 10:- On the "Re-image your computer" page, select the "Use the latest available system
image" option.

Quick tip: You can use the "Select a system image" option if you have multiple backups and you
are trying to restore an older version of the system and files.

Step 11:- Click the Next button.


Step 12:-(Optional) Carefully select the "Format and repartition disks" option before restoring
the backup (if you are restoring the backup on a new drive).

Quick tip: If you choose this option, use the Exclude disks option to prevent formatting
secondary drives that may contain data.
Step 13:- (Optional) Check the "Only restore system drivers" option (if the backup contains a
copy of multiple drives and you only want to restore the operating system).

Page 38 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 14:- Click the Next button.
Step 15:- Click the Finish button.

Step 16:- Click the Yes button.

Quick tip:- After you complete the steps, the recovery process will start on the computer. The
time to finish the restoration will depend on the amount of data and hardware configuration.
If you are about to restore a device, do not interrupt the process, as it can cause the backup to fail,
making it unbootable. It is always recommended to have the laptop connected to a power source
and a desktop computer to an uninterruptible power supply (UPS) to avoid problems.
Once the backup has been restored, open Settings  Update & Security Windows Update,
and click the Check for Updates button to quickly install any missing security updates.

Page 39 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
LAP Test
Task 1:- Create a full backup of Windows 10 with the system image tool
Task 2:- Restore damage computer by using bootable Windows 10 operating system.

Page 40 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Unit Three : Monitor network performance

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

 Performing diagnostic test


 Analyzing and responding information
 Monitoring software and files
 Monitoring performance indicators
 Improving network and systems
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:

 Perform diagnostic test


 Analyze and responding information
 Monitor software and files
 Monitor performance indicators
 Improve network and systems

Page 41 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
3.1. Basic concept of monitor network performance

Monitoring network performance involves the systematic observation and analysis of a computer
network to ensure it operates efficiently, reliably, and securely. This process encompasses various
aspects such as bandwidth utilization, latency, packet loss, and device health. By continually
assessing these factors, network administrators can identify and address potential issues before
they impact the user experience. Bandwidth monitoring helps optimize data transmission capacity,
latency monitoring ensures timely data delivery, and packet loss monitoring aids in maintaining a
stable and responsive network. Additionally, network performance monitoring includes traffic
analysis, security surveillance, and quality of service assessments to ensure that resources are
allocated effectively, potential security threats are detected, and the overall quality of
communication meets the desired standards. Utilizing specialized tools and reporting mechanisms,
organizations can maintain a proactive approach to network management, enhancing the overall
reliability and performance of their network infrastructure.

3.2. Performing diagnostic test

Performing network diagnostic tests involves a systematic process to assess and analyze the
health, performance, and functionality of a computer network. Here are the general steps you can
follow to conduct network diagnostic tests:
 Identify the Issue:
 Begin by identifying the specific issue or symptoms that require diagnostic testing. This
could include slow network performance, connectivity problems, or unexpected outages.
 Define Testing Objectives:
 Clearly define the objectives of your diagnostic tests. Determine what aspects of the
network you need to evaluate, such as bandwidth, latency, packet loss, or device health.
 Select Appropriate Tools:
 Choose the appropriate network diagnostic tools for the specific tests you want to perform.
There are various tools available for different aspects of network analysis, including:
 Ping and Traceroute: For assessing connectivity and latency.
 Network Performance Monitoring Tools: Such as Wireshark, Nagios, or PRTG
for detailed analysis of network traffic.

Page 42 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
 Bandwidth Testing Tools: Like Speedtest.net or iPerf for measuring available
bandwidth.
 Device Monitoring Software: To assess the health and performance of network
devices.
 Execute Diagnostic Tests:
 Perform the selected diagnostic tests. For example:
 Use ping to check connectivity and measure round-trip times.
 Conduct traceroute to identify the path and latency between your computer and a
destination.
 Run bandwidth tests to evaluate the network's capacity.
 Utilize network monitoring tools to analyze traffic patterns and identify potential
issues.
 Interpret Results:
 Analyze the results of the diagnostic tests. Look for anomalies, deviations from expected
values, or patterns that may indicate network issues. Pay attention to any packet loss,
latency spikes, or irregularities in traffic.
 Diagnose Network Issues:
 Based on the results, diagnose the root causes of identified network issues. This may
involve troubleshooting hardware, configuration settings, or addressing issues related to
network congestion.
 Implement Solutions:
 Once the issues are identified, implement appropriate solutions. This could include
adjusting network configurations, upgrading hardware, optimizing settings, or addressing
specific issues with network devices.
 Document and Report:
 Document the results of your diagnostic tests and the actions taken to address any issues.
This documentation is valuable for future reference and can help in maintaining a
proactive approach to network management.
 Continuous Monitoring:
 Establish a routine for continuous monitoring of the network. Regularly perform
diagnostic tests to identify and address potential issues before they impact network
performance.

Page 43 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
3.3. Analyze and respond information

Analyzing and responding to information in a network involves monitoring network traffic,


identifying potential issues or anomalies, and taking appropriate actions to ensure network
security, performance, and reliability. Here are some ways of analyze and respond to information
in a network:

1. Implement network-monitoring tools: Use network monitoring software or tools to capture


and analyze network traffic. These tools can provide real-time visibility into network activity,
including bandwidth utilization, packet loss, latency, and security events.
2. Establish baseline and thresholds: Establish a baseline of normal network behavior by
monitoring network traffic patterns over time. Set thresholds or alerts for abnormal network
behavior, such as unusually high traffic volume, network congestion, or security breaches.
3. Monitor network traffic: Continuously monitor network traffic to identify any anomalies
or deviations from the baseline. Observe patterns, trends, and irregularities that may indicate
network performance issues or security incidents.
4. Analyze network logs: Analyze log files generated by network devices, servers, and security
systems. Logs can provide valuable information about network events, errors, and security
incidents. Look for any suspicious or unusual activities that may require investigation or
response.
5. Identify security threats: Use intrusion detection and prevention systems (IDS/IPS) or
security information and event management (SIEM) solutions to detect and respond to
security threats. Analyze network traffic for signs of malware infections, unauthorized access
attempts, or other malicious activities.
6. Investigate network issues: When an issue or anomaly is detected, investigate the root cause
by analyzing relevant network logs, traffic patterns, and system configurations. Identify the
source of the problem, whether it's a misconfiguration, hardware failure, software bug, or
security incident.
7. Respond to network incidents: Take appropriate actions to address network incidents or
issues. This may involve implementing security measures, such as blocking malicious IP
addresses or isolating compromised devices. Troubleshoot network performance problems
and apply necessary fixes or optimizations.

Page 44 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
8. Document and report: Keep detailed records of network incidents, actions taken, and their
outcomes. Document any changes made to network configurations or security settings.
Prepare reports summarizing network performance, security incidents, and actions taken for
management and future reference.
9. Continuous improvement: Regularly review and update network monitoring and response
strategies based on lessons learned from past incidents. Stay updated with emerging threats,
new technologies, and best practices in network monitoring and security.
Analyzing and responding to information in a network requires a proactive and vigilant approach.
It is crucial to have skilled network administrators or security professionals who can effectively
interpret network data, identify potential risks or issues, and take prompt actions to maintain the
network's integrity and performance.
3.4. Monitor software and files
To monitor software and files using a network, you can employ various network monitoring
techniques and tools. Here are some steps to monitor software and files using a network:
1. Choose network-monitoring tools: Select network monitoring software or tools that offer
features for monitoring software and file activities. Look for tools that provide real-time
monitoring, alerting, and reporting capabilities specific to software and file monitoring.
2. Install monitoring agents or software: Install monitoring agents or software on the systems
or servers where the software and files are located. These agents will collect data and send it
to the central monitoring system for analysis.
3. Set up file integrity monitoring: Implement file integrity monitoring (FIM) to detect
unauthorized changes to files. FIM tools can monitor file attributes, checksums, or digital
signatures to ensure the integrity and security of critical files. Any unauthorized
modifications can trigger an alert.
4. Monitor network traffic: Utilize network-monitoring tools to capture and analyze network
traffic that is related to software and file activities. This can help identify any unusual or
unauthorized network connections, file transfers, or software downloads.
5. Enable logging and auditing: Enable logging and auditing features on servers and systems
hosting the software and files. Configure the logging settings to capture relevant information
about software installations, file accesses, modifications, and user activities. Regularly
review the logs for any suspicious or unauthorized activities.

Page 45 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
6. Configure alerts and notifications: Set up alerts and notifications within the network
monitoring tools to inform you of any abnormal software or file-related activities. Configure
the alerts to be sent via email, SMS, or other communication channels, ensuring that the right
individuals or teams are notified promptly.
7. Perform regular analysis and reporting: Regularly analyze the collected data, generate
reports on software, and file activities. Look for patterns, trends, or anomalies that may
indicate security risks, compliance violations, or performance issues. Share these reports with
relevant stakeholders for visibility and informed decision-making.
8. Maintain patch management and vulnerability scanning: Regularly apply software
patches and updates to address known vulnerabilities. Conduct vulnerability scans to identify
any weaknesses in software or files that could be exploited by attackers. Monitor the results
of patching and vulnerability scanning activities to ensure compliance and mitigate risks.
9. Continuously review and refine monitoring strategies: Review your monitoring strategies
and tools periodically to ensure they remain effective and aligned with your organization's
evolving needs. Stay informed about emerging threats, new monitoring technologies, and
best practices in software and file monitoring to enhance your monitoring capabilities.
3.5. Monitor performance indicators
Monitoring the performance indicators of a network is essential to ensure its optimal functionality.
To monitor network performance, start by identifying relevant performance indicators such as
bandwidth utilization, latency, packet loss, network throughput, and response times. Next, select
network monitoring tools that can collect and analyze data on these indicators. Deploy monitoring
agents or sensors on critical network devices and configure real-time monitoring to continuously
track performance metrics. Set up performance thresholds and alerts to receive notifications when
indicators exceed or fall below acceptable levels. Analyze historical data to identify trends and
patterns, and periodically conduct performance assessments. Utilize network traffic analysis tools
to examine traffic patterns and generate performance reports to gain insights into the network's
health. Continuously review and optimize your monitoring strategy to align with evolving network
requirements and industry best practices.
Monitoring network performance involves selecting relevant performance indicators, deploying
monitoring tools and agents, configuring real-time monitoring, setting up thresholds and alerts,
analyzing historical data, conducting periodic assessments, utilizing network traffic analysis, and
generating performance reports. By following these steps, you can proactively identify and address

Page 46 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
performance issues, optimize network resources, and ensure a reliable and efficient network
infrastructure. Regularly reviewing and optimizing your monitoring strategy is crucial to stay
aligned with changing network requirements and technological advancements.
3.6. Improve network and systems
Improving network and systems involves implementing strategies to enhance performance,
A step to enhance your network performance can enhance your overall productivity and business
continuity.
1. Reconfigure Your Network
Your network configuration can affect
performance. For instance, if you install an
update and it doesn't configure your devices,
this can have a large impact on your
performance. A good example is the personal
area network devices that should not be more
than 10 meters apart.
Devices with short-range connectivity should
be close to each other to prevent network
delays between the hardware components.
Reconfiguring your hardware components will help the devices communicate with each other
effectively.
2. Check for System Defects And Viruses
Viruses and system defects can break down a network infrastructure and degrade the network
performance. Some malwares can also control programs and applications in your network. A flaw
in the components or system can cause a network to behave unexpectedly.
Cable defects such as core rapture are a good example of issues that can cause failure in the
conduction of electricity, interfering with communication in a network. Checking for malware and
fixing system defects can address the situation and restore optimal performance.
3. Upgrade and Update Firmware and Software
Often, businesses cannot keep up with the pace of technology and balance with the software they
run. You may end up having software running on outdated technology in your network. You can
also have old machines with new programs.

Page 47 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Usually, there is no guarantee that programs and the existing technology are fully compatible,
which can negatively impact the network performance. Outdated software and programs also have
bugs that can break down your infrastructure.

4. Use Virtual Local Area Networks (VLANs)


VLANs reduce broadcast traffic, ease administration and
confine broadcast domains. You can use the technology
to segment your network resources such that critical areas
are given the highest priority. With VLANs, you can
separate or partition the network without rewiring the
entire office.
VLANs also play a vital role in enhancing security.
Splitting network components and prioritizing tasks in the
network can create room for performance optimization.
5. Provide a Guest Network
Having multiple users on a network increases traffic, which affects network performance. An
enterprise network accommodating hundreds of guest users is bound to experience slowdowns.
Guests can demand bandwidth that your business would otherwise be using on other important
tasks.
6. User Education
Educating your team on user behavior can enhance network performance. Often, employees use
their free time on their computers. They could choose to stream a show or play video games,
unaware of the impact of the activities on the network resources.
In this case, employees should be educated on how the downtime activities of their computers
affect network performance. They are likely to settle for other activities that don't strain the
resources with this knowledge.
Educating your employees on best practices for spending time on their computers, running
processes, and utilizing network resources can help improve performance.

Page 48 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
7. Network Monitoring:- Monitoring your network for traffic jams and bottlenecks can help you
diagnose problems, solve them in good time, and prevent
advancing network issues. For instance, if the network admin
identifies backups as the reason behind substandard network
performance, they can schedule them for a time when the
personnel are not utilizing most of the network resources.
Regular network monitoring can help you spot the
bottlenecks, address them, and enhance network
performance.

Figure 1. 8 Network Monitoring

Page 49 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Self-check - 3
Part I:- Say True if the given statement is correct else say False
_______1. Performing diagnostic tests involves analyzing and responding to information.
_______2. Monitoring software and files is not a part of the diagnostic testing process.
_______3. Diagnostic testing does not involve monitoring performance indicators.
Part II: - Select the appropriate answer from the given alternative
_______1. What is the purpose of analyzing and responding to information in network
administration?
A. Improving network aesthetics C. Identifying performance bottlenecks
B. Monitoring software license usage D. Ensuring physical security measures
_______2. which of the following is a common performance indicator monitored in
network administration.
A. Keyboard typing speed C. File compression ratio
B. Server room temperature D. Network bandwidth utilization
_______3. How does improving network and systems contribute to network
administration?
A. Increasing software licensing costs
B. Enhancing data backup and recovery
C. Monitoring physical server dimensions
D. Optimizing network configurations
_______4. How does improving network and systems contribute to network
administration?
A. Monitoring office supply inventory
B. Increasing software licensing compliance
C. Enhancing network security measures
D. Optimizing printer paper tray configurations
Part III: - Give short answer
1. List and explain ways of analyze and respond to information in a network?
2. Demonstrate the way of improve network and systems?

Page 50 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
3. Demonstrate the technic of monitor software and files using a network?

Operation sheet 3.1.


Operation title: - Diagnostic network performance
Purpose: - To recover network problem and test performance.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute
Procedures:-
Step 1:- Press Windows + I to open Settings
Step 2:- Click on Network and Internet

Step 3:- Under the left-hand panel, option Status navigate to Network Troubleshooter and click
it

Page 51 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 4:- Then the tool will start to run a network check to find what can be possibly wrong with
the connectivity
I will show you how it will work. Let’s say I am not connected to my preferred network. Then
upon running a network check using the Network Troubleshooter, I will get the following result.

Page 52 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Operation sheet 3.2.
Operation title: - Speed up Internet connection on Windows 10
Purpose: - To increase download and upload speed of internet connection.
Instruction: Use the figure below, given equipment and task. You have given 45 Minute for the
task and you are expected to complete tasks.
Tools and requirement:-Compute, Internet, Internet cable, NW driver
Procedures:-
To speed up Windows 10 internet, you can make some small changes on Windows 10 to quickly
resolve these culprits for slow internet speed and enjoy faster internet in five ways.
Way 1. Change Bandwidth Limit to Speed up Internet on Windows 10
Step 1. Open the Settings on your Windows 10.
Step 2. Click Update & Security Advanced options in turn.

Page 53 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 3. In the Advanced options window, scroll down to find Delivery Optimization and click it.
Step 4. Choose advanced options again at the bottom.
Step 5. After that, you will see an adjuster for both Download settings and Upload settings. Here,
you can reset the amount of bandwidth that Windows can use for your core tasks.

Page 54 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Way 2. Get the Best VPN to Speed up Internet on Windows 10
Step 1. Download this free VPN on your Windows and launch it.

Step 2. Click All Servers in the left navigator. You will see a long list of all available servers in
multiple countries, like USA, Mexico, Canada, United Kingdom, etc.

Step 3. To speed up internet on Windows 10, select a server (USA, for instance) and click Connect.
Then you can enjoy faster speeds with the USA server in no time.

Page 55 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Way 3. Reset DNS Settings to Speed up Internet on Windows 10

Step 1. Search view network connections in search box of Windows 10 and enter it.
Step 2. Then right click on your network adapter and select Properties at the bottom.
Step 3. Now, select Internet Protocol Version 4 from the list under Networking and click on the
Properties tab.

Page 56 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Step 4. Now, select Use the following DNS server addresses and type to enter Google DNS as
follows: 8.8.8.8
8.8.4.4

Step 5. Lastly, click on Apply and select OK.

Way 4. Change Adapter Settings to Speed up Internet on Windows 10


Step 1. Press Windows + I key together to open Settings on Windows 10.
Step 2. Now, select Update & Security and click Windows Update from the left menu.
Step 3. Then click on Advanced options from the right side.
Step 4. Turn off Download updates over metered connections (extra charges may apply).

Page 57 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Way 5. Turn off Background Apps to Speed up Internet on Windows 10
Step 1. Open Settings panel as mentioned in the foregoing part.
Step 2. Then click on Privacy.

Step 3. Now, choose background apps from the left menu.


Step 4. Lastly, switch the button under Background apps to off.

Page 58 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Way 6. Clear Temp and Cached Files to Speed up Internet on Windows 10
Step 1. Search Disk Cleanup in your Windows 10
search box.
Step 2. Next, click on Disk Cleanup.
Step 3. Select C Drive in the pop-up box.
Step 4. Then, select all files from the files list and
click OK to delete all useless files on your PC at
present.

Step 5. Continue to click on Clean up system files.


Step 6. Also, do remember to clear your recycle
bin.

Page 59 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
LAP Test
Task 1:- Diagnostic and test network performance
Task 2:- Test download and upload speed of your computer Internet

Page 60 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Unit Four : Migrate to New Technology

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
 Developing new skills.
 Upgraded technology skills
 Identifying upgraded equipment.
 Sources of information for new or upgraded equipment
 Using new or upgraded equipment
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
 Develop new skills.
 Upgraded technology skills
 Identify upgraded equipment.
 Understand Sources of information for new or upgraded equipment
 Use new or upgraded equipment

Page 61 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
4.1. Basic concept of Migrating to new technology
Migrating to new technology involves the strategic transition from existing technological systems
to advanced solutions. This process entails a comprehensive assessment of current infrastructure,
careful planning, and seamless execution to optimize efficiency and stay competitive. Successful
migration requires evaluating compatibility, scalability, and security aspects, along with effective
change management to mitigate disruptions. Post-migration, ongoing support and monitoring are
essential to ensure the smooth integration of new technology, enhancing operational capabilities
and positioning the organization for sustained growth in a dynamic technological landscape.
4.2. Develop new skills.
Developing new skills in new technology requires a systematic approach and a commitment to
continuous learning. Here are steps to help you develop new skills in emerging technologies:
1. Identify the technology: Start by identifying the specific technology or field you want to
develop skills in. Research and understand its fundamentals, applications, and potential
impact in your industry or area of interest.
2. Set clear goals: Define your learning goals and objectives. Determine what specific skills,
knowledge, or certifications you want to acquire in the new technology.
3. Assess existing skills: Evaluate your existing skills and knowledge related to the technology.
Identify any foundational knowledge or transferable skills that can serve as a starting point
for your learning journey.
4. Select learning resources: Identify high-quality learning resources that suit your preferred
learning style. These resources may include online courses, tutorials, books, video lectures,
forums, or workshops.
5. Create a learning plan: Develop a learning plan that outlines the topics, concepts, and skills
you need to cover. Break down the learning process into manageable chunks and set a
schedule or timeline for your learning activities.
6. Embrace continuous learning: Technology evolves rapidly, so commit to continuous
learning. Stay curious, explore new developments, and keep up with industry news and
updates. Dedicate time regularly to learn and stay updated on advancements in the
technology you're focusing on.

Page 62 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
4.3. Upgraded technology skills
Upgrading technology skills is an ongoing process that requires dedication, perseverance, and a
commitment to lifelong learning. Embrace new challenges, be proactive in seeking opportunities,
and apply your upgraded skills in practical settings to maximize their impact.
To upgrade your technology skills, you can follow these one:
 Identify Areas for Improvement:
 Set Clear Goals
 Create a Learning Plan:
 Engage in Practical Projects:
 Stay Updated and Practice Continuously
 Seek Feedback and Networking
4.4. Identify upgraded equipment.
Upgraded equipment refers to the improved or advanced versions of technological devices or tools
used in various domains. It involves the enhancement of hardware components, software
capabilities, performance, features, or functionalities of a specific piece of equipment. Upgrades
can include improvements in processing power, memory capacity, storage capacity, connectivity
options, display quality, battery life, security features, or any other aspect that enhances the overall
performance or user experience of the equipment. Upgraded equipment often incorporates the
latest technological advancements and innovations to deliver superior performance, increased
efficiency, and enhanced capabilities compared to previous versions or older models.
1. Computers:
 High-performance desktop computers with advanced

processors, increased RAM, and faster storage options


like solid-state drives (SSDs).
 Laptops with improved battery life, higher screen
resolutions, and enhanced graphics capabilities.
 Workstations designed for intensive tasks such as
video editing, 3D rendering, or scientific simulations,
featuring powerful processors, ample RAM, and
dedicated graphics cards.
figure 1. 9 upgraded computer

Page 63 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
2. Smartphones:
 Flagship smartphones with faster processors, larger RAM capacity, and improved
camera technologies.
 Devices with 5G connectivity for faster internet speeds and lower latency.
 Smartphones equipped with advanced biometric authentication methods like facial
recognition or under-display fingerprint sensors.

Figure 4. 1 upgraded smartphone

3. Networking:
 Upgraded routers with the latest Wi-Fi standards (such as Wi-Fi 6 or Wi-Fi 6E) offering
faster speeds and better network performance.
 Network switches with higher port densities, increased bandwidth, and support for
advanced features like Power over Ethernet (PoE) or Quality of Service (QoS).
 Firewall appliances with enhanced security capabilities, such as intrusion prevention
systems (IPS), deep packet inspection (DPI), or advanced threat protection (ATP).

Figure 4. 2 History of network

Page 64 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
4. Cameras and Photography:
 Digital cameras with higher megapixel counts, improved low-light performance, and
advanced autofocus systems.
 Mirrorless cameras with faster burst shooting rates, improved image stabilization, and
high-resolution electronic viewfinders.
 Drones equipped with high-resolution cameras, obstacle avoidance sensors, and
intelligent flight modes for aerial photography and videography.

Figure 4. 3 History of camera

5. Virtual Reality (VR) and Augmented Reality (AR):


 VR headsets with higher display resolutions, wider field of view, and improved
tracking accuracy.
 AR glasses with lightweight designs, better transparent display technology, and
enhanced gesture recognition.
 Controllers and haptic devices that provide more precise and immersive interactions
within virtual environments.

Figure 4. 4 Virtual Reality (VR) and Augmented Reality (AR)

Page 65 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
4.5. Understand Sources of information for new or upgraded equipment
1. Manufacturer Websites: The official websites of equipment manufacturers provide
comprehensive and accurate information about their products. These websites often
include detailed specifications, features, pricing, and availability of the latest models or
upgrades.
2. Technology News Websites: Websites that specialize in technology news and reviews,
such as CNET, Engadget, The Verge, PCMag, and Gizmodo, offer up-to-date coverage on
new and upgraded equipment. They provide in-depth articles, reviews, comparisons, and
expert insights into the latest technology trends and advancements.
3. Industry-specific Publications: Industry publications and magazines dedicated to specific
fields or sectors often feature articles and reviews about new or upgraded equipment.
Examples include Wired, Popular Science, IEEE Spectrum, or Automotive News,
depending on your area of interest.
4. Online Forums and Communities: Online forums and communities focused on specific
equipment or technology domains are valuable sources of information. Platforms like
Reddit, specialized forums, or dedicated Facebook groups allow users to discuss, share
experiences, and ask questions about new or upgraded equipment.
5. Professional Networks and Colleagues: Networking with professionals in your industry
or field can provide valuable insights into new or upgraded equipment. Engaging with
colleagues, attending industry events, or joining professional organizations can help you
tap into their expertise and firsthand experiences with the equipment you are interested in.
4.6. Use new or upgraded equipment
When organizations want to make a significant change to their business systems, new technology
or new equipment is generally part of the change. Using new or upgraded equipment typically
involves several steps to ensure a smooth and efficient transition. Here is a general guide:
1. Read the Manual:- Start by thoroughly reading the user manual or any accompanying
documentation that comes with the equipment. This will provide you with a detailed

Page 66 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
understanding of its features, functionalities, and proper usage.

Figure 4. 5 User manual of printer


2. Familiarize Yourself: Take some time to get familiar with the equipment. Explore its buttons,
controls, and settings. Understand how to power it on/off, adjust settings, and navigate through
different menus or options.
3. Practice Hands-On: Engage in hands-on practice with the equipment. Start with simple tasks
or basic functions to gain confidence and gradually progress to more complex operations.
Experiment with different settings and features to understand their impact and functionality.
4. Seek Training or Tutorials: If available, attend training sessions or workshops related to the
equipment. Alternatively, search for online tutorials, video guides, or forums where you can
learn from others' experiences and expertise.

Page 67 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
5. Troubleshooting and Maintenance: Familiarize yourself with common troubleshooting
techniques specific to the equipment. Learn how to identify and resolve common issues that
may arise during usage.

Figure 4. 6 Troubleshooting and Maintenance

Page 68 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Self-check - 4
Part I: - Say True if the given statement is correct else say False
_______1. Upgrading technology skills involves identifying upgraded equipment.
_______2. Understanding sources of information for new or upgraded equipment is necessary when
upgrading technology skills.
_______3. Using new or upgraded equipment is not important in the process of upgrading technology
skills.
Part II: - Select the appropriate answer from the given alternative
1. Which of the following is a benefit of identifying upgraded equipment when upgrading
technology skills?
A. It improves physical fitness C. It boosts creativity in art and design
B. It enhances problem-solving abilities D. It promotes healthy eating habits

2. How does using new or upgraded equipment contribute to upgrading technology skills?
A. It improves social interaction skills
B. It enhances critical thinking abilities
C. It promotes physical well-being
D. It develops musical talent
3. Which of the following is an example of upgraded equipment in the context of upgrading
technology skills?
A. Pencil and paper C. Smartphone
B. Typewriter D. Abacus
4. Which of the following is a direct outcome of upgrading technology skills?
A. Building a sandcastle C. Writing poetry
B. Solving complex technological D. Playing sports
problems
Part III: - Give short answer
1. List and explain Sources of information for new or upgraded equipment?
2. Demonstrate the way of develop new skills in emerging technologies?
3. List and explain upgraded equipment in ICT?

Page 69 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Reference
List of Books
1. The Practice of System and Network Administration
2. Network Security Essentials: Applications and Standards" by William Stallings
3. Network Programmability and Automation: Skills for the Next-Generation Network
Engineer" by Jason Edelman, Scott S. Lowe, and Matt Oswalt
4. Network Management: Principles and Practice" by Mani Subramanian:
5. Network Analysis, Architecture, and Design" by James D. McCabe

List of website

1. https://www.windowscentral.com/how-make-full-backup-windows-10#section-how-to-
restore-a-backup-with-system-image-tool-on-windows-10
2. https://www.comparitech.com/net-admin/network-troubleshooting-tools/
3. https://www.itechguides.com/how-to-get-administrator-privileges-on-windows-10/
4. Make an administrator account to a standard user on Windows 10/11 (softwareok.com)
5. https://www.devicemag.com/network-testing-tool/
6. https://www.itopvpn.com/blog/speed-up-internet-on-windows-10-3123

Page 70 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright
Developer profile
No Name Qualificati Field of Study Organization/ Mobile number E-mail
on (Level) Institution
1 Zerihun Abate MSc ITM Sebata PTC 0911858358 [email protected]

2 Abebe Mintefa MSc ITM Ambo TVETC 0929362458 [email protected]

3 Endale Berekat Bsc Computer Science M/G/M/B/P/T/C 0915439694 [email protected]

4 Yinebeb Tamiru Bsc Computer science Akaki PTC 0936325182 [email protected]

Page 71 of 72 Ministry of Labor and Providing network systems Version -1


Skills
administration level - III November , 2023
Author/Copyright

You might also like